When we think of cyberattacks, we often imagine movie-like scenarios that seem unlikely, where threats exploit devices such as cameras, temperature detectors, or complex machinery such as medical or industrial equipment.
Actually, these scenarios are not futuristic; devices like the above mentioned are real attack vectors that are often underestimated.
To protect an infrastructure composed of heterogeneous devices and managed by multiple teams, it is essential to create an asset inventory based on three key points:
Interview by:
Giuseppe Letizia - Execution Director, Sorint.SEC
Emanuele T. - Staff Sales Engineer, Nozomi Networks
Ciro Cozzolino - Cyber Security Analyst Tier 2, Sorint.SEC